Lucene search

K
cve[email protected]CVE-2023-6482
HistoryJan 27, 2024 - 1:15 a.m.

CVE-2023-6482

2024-01-2701:15:08
CWE-798
CWE-321
web.nvd.nist.gov
11
cve-2023-6482
synaptics
fingerprint driver
encryption key
tls session
security vulnerability

5.2 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Use of encryption key derived from static information in Synaptics Fingerprint Driver allows

an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor.Β This may
allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the
template database.

Affected configurations

NVD
Node
synapticsfingerprint_driverRange6.0.00.1103–6.0.17.1103

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Synaptics Fingerprint Driver",
    "vendor": "Synaptics",
    "versions": [
      {
        "lessThan": "6.0.17.1103",
        "status": "affected",
        "version": "6.0.0.1103",
        "versionType": "custom"
      }
    ]
  }
]

5.2 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Related for CVE-2023-6482